Search For:

Displaying 1-4 out of 4 total
Statistical Anomaly Detection for Link-State Routing Protocols
Found in: Network Protocols, IEEE International Conference on
By D. Qu, B. Vetter, F. Wang, R. Narayan, S. Wu, Y. Jou, F. Gong, C. Sargor
Issue Date:October 1998
pp. 0062
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against the OSPF (open shortest path first) routing protocol. This paper presents the implementation and experiments of JiNao's statistical intrusion detection modu...
 
Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure
Found in: DARPA Information Survivability Conference and Exposition,
By Y.F. Jou, F. Gong, C. Sargor, X. Wu, S.F. Wu, H.C. Chang, F. Wang
Issue Date:January 2000
pp. 1069
This paper presents the design, implementation, and experimentation of the JiNao intrusion detection system (IDS) which focuses on the protection of the network routing infrastructure. We used Open Shortest Path First (OSPF) routing protocol as an implemen...
 
Design and Implementation of A Real-Time Decentralized Source Identification System for Untrusted IP Packets
Found in: DARPA Information Survivability Conference and Exposition,
By H.Y. Chang, P. Chen, A. Hayatnagarkar R. Narayan, P. Sheth, N. Vo, C.L. Wu S.F. Wu, L. Zhang, X. Zhang, F. Gong, F. Jou, C. Sargor, X. Wu
Issue Date:January 2000
pp. 1100
DECIDUOUS is a security management framework for identifying the \true
 
Multipoint audio and video control for packet-based multimedia conferencing
Found in: Proceedings of the second ACM international conference on Multimedia (MULTIMEDIA '94)
By F. Gong
Issue Date:October 1994
pp. 425-432
With the advent of broadband integrated services data network (B-ISDN) technologies such as Asynchronous Transfer Mode (ATM) networks, packet-based multimedia (e.g., live audio and video, animation, and text) conferencing is becoming a viable means for ach...
     
 1